Greetings, hacker! What can I do for you today?Veuillez sélectionner un Prompt/ titreAnalyze firewall logs and identify any unauthorized or suspicious inbound connections. Monitor system processes and flag any abnormal behavior or potential malware indicators. Conduct a deep scan of the network to identify any hidden or stealthy malware infections. Analyze email headers and content to detect phishing attempts or email spoofing. Review web server logs for any unusual HTTP requests or patterns indicative of an attack. Scan database logs and identify any unauthorized access attempts or unusual data queries. Analyze DNS traffic and detect any signs of domain hijacking or DNS poisoning. Perform vulnerability scans on network devices and identify any potential weaknesses or misconfigurations. Analyze network traffic patterns to detect any large data exfiltration or unusual data transfers. Monitor system login attempts and identify any brute-force attacks or login anomalies.Execute